Section 13 Activities. Activity 1 Complete the following table with possible reasons why ICT security might be compromised Security BreachPossible reason.

Slides:



Advertisements
Similar presentations
Ch-11 Project Execution and Termination. System Testing This involves two different phases with two different outputs First phase is system test planning.
Advertisements

1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
1 Network Security Ola Flygt Växjö University
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Section 2.6 Question 1. Section 2.6 Answer 1 Section 2.6 Question 2.
Management Information Systems. (MIS)
ICAICT202A - Work and communicate effectively in an IT environment
Maintenance of a system
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Computer Networks IGCSE ICT Section 4.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Legal Framework Can you work out which slide each bullet point should go on?!
Getting Started and Introduction. Free to Receive messages and files Free low use account or Professional account allow file sending Easy and completely.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Describe the following features of LAN’s, WAN’s, and the internet: transmission media, bandwidth, geographical spread and functions. Description of a.
G041: Lecture 16 Section B Revision Questions
IT Security for Users By Matthew Moody.
LANs and WANs Coatbridge High School Computing Department.
Computer Legislation The need for computer laws Go to Contents.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
A Level ICT Unit Implementing CBIS’s. Support Installing a new system is disruptive and the support program will need to be planned well in advance.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
GCSE ICT 3 rd Edition Computer networks 19 A computer network is a collection of computers linked together so that they can communicate with each other.
Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Getting Started with REACH Delivery. Free to Receive messages and files Easy and completely free to install Comprehensive online help Free Support Forum.
By Dinesh Bajracharya Nepal Components of Information system.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
ORGANISATIONAL CULTURE ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY FAILING TO PLAN, IS PLANNING TO FAIL ASPECTS THAT SHOULD BE ADRESSED DURING.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Communications & Networks National 4 & 5 Computing Science.
Mr C Johnston ICT Teacher
Describe the potential of IT to improve internal and external communications By Jim Green.
Creating and Managing Networks CSC February, 1999.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
Secure Communications Tony Payne YJB IT Security Officer
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
In your pairs What is your law? Why is it important to have the law? How was law broken? Give examples of how to avoid being prosecuted under the law or.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
IT 244 Week 6 DQ 2 To purchase this material link 244-Week-6-DQ-2 For more courses visit our website
8 – Protecting Data and Security
Tor Good + Evil.
Legislation in ICT.
Data & Network Security
TB2 Lesson 5 Data Protection
ICT meeting Business needs
MyHR and Data Protection
Code of conduct Year 13.
Legislation in ICT.
Network Security Ola Flygt Växjö University
There are two different types of computer network:
Securely run and grow your business
Presentation transcript:

Section 13 Activities

Activity 1 Complete the following table with possible reasons why ICT security might be compromised Security BreachPossible reason Unauthorised access to data Impersonating another user Changing functionality of software Link into someone else’s communication link Claim to have either sent data or indeed not sent

Activity cont. Describe 2 internal and 2 external threats to the ICT system Describe some of the reasons why individuals or organisations might try to breach security of ICT systems Name 2 type of threat to ICT systems Describe a means of protecting data that is being transferred over a network

Activity cont. If the security measures put in place fail to keep external threats at bay, what legislation is in place to prosecute offenders? Describe the measures put in place by the Data Protection Act and describe the effectiveness of the legislation.